Overview

The days of a simple EIP overwrite and a JMP ESP are long gone. Exploit developers need to take their skills to the next level in order to circumvent the most current exploit mitigations put in place on Windows operating systems. Offensive Security's Advanced Windows Exploitation Techniques will challenge you to think laterally and develop creative solutions in today's increasingly difficult exploitation environment.

Advanced Windows Exploitation provides an in-depth and hardcore drilldown into topics ranging from precision heap spraying to DEP and ASLR bypass techniques to real-world 64-bit kernel exploitation. This course is extremely hands-on and includes a lab environment, which is tailored to challenging and bringing the most out of you. The case studies covered include vulnerabilities discovered by our research team or exploits written by us.

Who Should Take This Course

This is NOT an entry level course, previous exploitation experience in Windows environments and basic use of a debugger is required. If you write basic Windows exploits, and need a serious boost, you're in the right place.

Student Requirements

It is assumed the student is experienced in Windows exploit development and understand how to operate a debugger. Familiarity with WinDbg, Immunity Debugger, and Python scripting is highly recommended.

What Students Should Bring

You want to bring a *serious* laptop along. One able to run 3 vms with ease. Please do not bring netbooks.• VMware Workstation / Fusion• At least 80 GB HD free• At least 4 GB of RAM• Wired Network Support• USB 2.0 support or better• 64bit Host operating system• A will to suffer intensely

What Students Will Be Provided With

Students will be provided virtual machines for use in the class.

Trainers

Matteo Memelli: Since Matteo Memelli's first experiences in the security industry, he has been "hacked" by his passion for remote exploitation, vulnerability research and covert channels analysis. Matteo is an avid researcher and developer in the exploit field, his passion for security drove him to create this class. He is the co-creator and lead trainer of Offensive Security's first Exploit Development specialty class.